A vulnerability was found in CodeAstro House Rental Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ownersignup.php. The manipulation of the argument f/e/p/m/o/n/c/s/ci/a leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "m" to be affected. But it must be assumed that many other parameters are affected as well.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://vuldb.com/?id.289303 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.289303 | signature vdb entry permissions required |
https://vuldb.com/?submit.468375 | third party advisory vdb entry |
https://github.com/Wind-liberty/CVE/issues/1 | third party advisory issue tracking exploit |
https://codeastro.com/ | product |